î ‚Jan 24, 2024î „NewsroomCloud Security / Kubernetes Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) ...
Category: Attack
The ransomware group known as Kasseika has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) attack to disarm security-...
î ‚Jan 24, 2024î „The Hacker NewsSaaS Security / Endpoint Security In today's highly distributed workplace, every employee has the ability to act as...
î ‚Jan 24, 2024î „NewsroomCryptocurrency / Cybercrime Governments from Australia, the U.K., and the U.S. have imposed financial sanctions on a Russi...
î ‚Jan 24, 2024î „The Hacker NewsVulnerability / Software Security In a world where more & more organizations are adopting open-source component...
î ‚Jan 24, 2024î „NewsroomVulnerability / Endpoint Security A critical security flaw has been disclosed in Fortra's GoAnywhere Managed File Transfer...
The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partnerships with another entity known as VexTrio as...
î ‚Jan 23, 2024î „NewsroomSoftware Security / Supply Chain Two malicious packages discovered on the npm package registry have been found to leverage...
î ‚Jan 23, 2024î „NewsroomMalware / Cryptocurrency Cracked software have been observed infecting Apple macOS users with a previously undocumented st...
î ‚Jan 23, 2024î „The Hacker NewsCybersecurity / Server Security As we enter 2024, Gcore has released its latest Gcore Radar report, a twice-annual ...
